General
-
Target
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe
-
Size
1.4MB
-
Sample
240820-v2wmtavbjg
-
MD5
8fedf5854abcc5c9349c76f3e1fb9151
-
SHA1
6cfc2e112133cc8e455fadae1503d506c65d1f40
-
SHA256
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95
-
SHA512
70cddf941ce1f13ba7f0e76c54530d6c1e2f572998019302cbc500b1be550367f9b7ba793410f61ca0b077c9544ee8e904b5a0582b403bfdc53f3dc0bab9ae39
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8aSa1ObT/e0fvr+K3P2Sn1qRLq/SmL:2TvC/MTQYxsWR7af1KVfvr+K3+SnkBy
Static task
static1
Behavioral task
behavioral1
Sample
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95.exe
-
Size
1.4MB
-
MD5
8fedf5854abcc5c9349c76f3e1fb9151
-
SHA1
6cfc2e112133cc8e455fadae1503d506c65d1f40
-
SHA256
e4e65b81d89c70ac3adb561ea6536b86544b0838a6e12baf1dadfb969d929b95
-
SHA512
70cddf941ce1f13ba7f0e76c54530d6c1e2f572998019302cbc500b1be550367f9b7ba793410f61ca0b077c9544ee8e904b5a0582b403bfdc53f3dc0bab9ae39
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8aSa1ObT/e0fvr+K3P2Sn1qRLq/SmL:2TvC/MTQYxsWR7af1KVfvr+K3+SnkBy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-